Presentation is loading. Please wait.

Presentation is loading. Please wait.

Airport Security Norman Ashford,H.P.Martin Stanton. Clifton A.Moore, Airport Operation, pp243-265, 1997.

Similar presentations


Presentation on theme: "Airport Security Norman Ashford,H.P.Martin Stanton. Clifton A.Moore, Airport Operation, pp243-265, 1997."— Presentation transcript:

1 Airport Security Norman Ashford,H.P.Martin Stanton. Clifton A.Moore, Airport Operation, pp , 1997

2 Outline Introduction Structure Responsibility
Airside Security Procedures Landside Security Procedures-Passenger Terminal Landside Procedures-Cargo Terminal Security Equipment and Systems Security Operations

3 Introduction Worldwide Breakdown of High Jacking Incidents 1989-1993
1992 1991 1990 1989 Totals Hijackings Sub-Saharan Africa 4 5 3 2 1 15 Asia 17 27 Europe 7 Latin America 16 Middle East and North Africa 9 North America Central Eurasia 10 45 Incidents by Category Total Incidents, 1993 1992 1991 1990 1989 Civil aviation Hijackings 31 12 24 40 15 Commandeerings 2 4 1 Bombings/attempted bombings/shootings General/charter aviation 5 10 3 Airport attacks 17 27 6 7 Off-airport attacks 20 50 47 Shootings at aircraft 9 Totals 84 98 120 57 36 Incidents not counted 13

4 Incidents against aviation by geographic region and category
1989 to 1993.

5 Structure of Planning for Security
Planning to meet the needs of a security emergency requires the involvement of a number of organizations, such as: The airport administration The operating airlines The National Civil Aviation Organization (FAA, CAA, etc.) Police Military Medical services Security services Labor unions Customs Government departments

6 Responsibility and Organization
Broad Principles of Universal application: Feasibility. Responsibility Efficiency. Coordination. Resources.

7 Receipt of intelligence/
Director of Civil Aviation Security (ACD-1) Civil Aviation Security Division (ACS-100) Special Programs Division (ACS-200) Intelligence Coordinates merging of other divisions at this point in the process. Assesses vulner- ability and draws up recommended or required countermeasures. Federal Air Marshal program for hijacking threats, Aviation Security Technology branch for threats involving explosives. Develops appropriate countermeasures for above. Continues input from previously completed threat assessment. Risk assessment model used is Threat + Vulnerability = risk division (ACS-400) Threat assessmentt Model use is Capabilities + Intentions =threat Intelligence/ threat information Receipt of intelligence/ Threat information Risk assessment U.S Intelligence Agencies State Department (including Embassies) FBI Military investigative agencies Other U.S. Federal law enforcement Foreign governments (Minimal) State and Local Classified and unclassified No threat exits Receipt, assessment and dissemination of intelligence/threat information .

8 Security Directive of Information Circular Dissemination
Foreign airport Security structure Varies by country, but is frequently Conducted by Several levels of government.x Security Directive of Information Circular Threat cannot be countered with additional security Measures-flight cancelled Additional countermeasures needed- security directive No additional information circular Draft of directive or circular prepared by intelligence division (ACS-400) Signed By ACS-1 Department of Transportation State Appropriate U.S. Intelligence and law Enforcement agencies on case by case basis FAA regions U.S. and overseas ATA carrier representative Embassies and Missions Embassy Security officer and FAA liaison, FAA Host government agencies responsible for airport security FAA principal inspector U.S. carriers corporate office U.S. carrier station (at airport) Ground security coordinator in-filght security (where appropriate) security directive requires enhanced security and/or countermeasures. Information circular is used for informational purposes only. FAA aviation security field offices or units (CASFO’s) Approximately 500 (Part 107) airports serving commercial traffic (where appropriate) Dissemination

9 Aviation security positions created by the Aviation Security Improvement Act of 1990
Office of secretary of transportation Director of Intelligence and security -serve as primary liaison of the secretary to the intelligence and law enforcement communities; -receive, assess, and distribute intelligence relative to long-term transportation security; -develop policies, strategies, and plans for dealing with threats to transportation security Federal Aviation Administration Associate Administrator for Civil Aviation Security -assess threats to civil aviation; -manage and guide FAA field security resources; -enforce security-related requirements; -identify related R&D requirements Federal security manager -designated focal point for federal aviation security activities at each Category X airporta Foreign security officer -assigned to each airport outside the United States at which extraordinary security measures are required aCategory X airports (19) typically have a large number of passenger enplanements per year, along with departing international flights.

10 Airside Security Procedures
Fencing Identification of persons Identification of vehicles Protection of aircraft on aprons Control of general aviation Transfer and interlining passengers, baggage, and cargo Aircraft isolated parking position and disposal area

11 The part to baggage carousels not open to the public for Airside Security Procedures

12 Landside Security Procedures- Passenger Terminal
Security measures in the passenger terminal area are most effective in preventing subsequent unlawful acts in the air Ideally a security systems operates throughout the whole passenger facilitation process of ticketing, passenger and baggage check-in, and boating.

13 Advantages and Disadvantages of centralized and Decentralized Search Procedures
Favored by passengers Passenger segregation in a sterile departure lounge is difficult to achieve Minimum personnel and equipment needed to process a given number of passengers Requires staff search Encourages passenger spending in restaurants and duty-free and other shops Passenger separation (arriving and departing) difficult to achieve Easier to have policemen on duty in on place Surveillance of passengers difficult at busy airports Only one standard of search is possible, whereas high risk flights may require more thorough search Gate Search The separation and surveillance problem is eliminated Requires earlier call-forward of passengers The risk of collusion is minimized Results in loss of revenue from restaurants, bars, shops, etc. Allows special measures to be taken on high risk flights Involves long waiting in crowded gate lounges with no facilities Requires more personnel and more equipment to process a given number of passengers Creates problems of search team availability of flight schedules go awry Makes a police presence difficult depending on number of gates in use at one time Allows passengers to get close to aircraft specific passengers and lines them up for attack when queuing Current gate lounges inadequate for future aircraft Pier Search Combines the advantages and disadvantages of the other systems Could be the best bet if space available in the right place to set up search points

14 Landside Procedures-Cargo Terminal
Identification. Security of all doors and windows. Control of access.

15 Security Equipment and Systems
Security fencing and manned barriers. Intruder detection. Lighting. Metal detection. Explosive and incendiary device detectors. Pressure chambers. Bunker. Office security equipment.

16 Security Program for Security Operations
General Organization Airport Security Committee Airport Activities Security Measures at the Airport Contingency Plans to Respond to Acts of Unlawful Interference Security Training Program Appendices to Security Program Lisbon Airport

17 Security check (video)

18 Security check (video)

19 Security check (video)

20 Key Terms Responsibility Airside security procedure
Landside security procedure Passenger terminal Cargo terminal Security equipments and systems Security operation Jacking incidents Hijackings Security Equipment

21 Key Terms (cont.) Bombings Off-airport attacks Incident
Security services Airport administration Feasibility Responsibility Efficiency Coordination Resources

22 Key Terms (cont.) Receipt of intelligence Threat information
Threat assessment Risk assessment Dissemination Director of intelligence and security Associate administrator for civil Aviation Security Federal security manager Foreign security officer

23 Key Terms (cont.) Fencing Identification Security Program


Download ppt "Airport Security Norman Ashford,H.P.Martin Stanton. Clifton A.Moore, Airport Operation, pp243-265, 1997."

Similar presentations


Ads by Google